TWiki
>
P1735 Web
>
P1735PublicDocuments
>
P1735Minutes2014Jun20
(2014-06-20,
DaveGraubart
)
(raw view)
E
dit
A
ttach
---++ IEEE P1735 Draft Development Committee Meeting of June 20, 2014 ---+++ Meeting Info [[P1735MeetingInfo][Conference Information]] ---+++ Participants * Attending * Dave Graubart, Synopsys _DR_ (Chair) * Joe Daniels, P1735 Technical Editor * Rod Price, Synopsys _DRA_ * Ray Martin, Xilinx _DR_ * Satyam Jani, Aldec _DR_ * Steven Dovich, P1076 liaison * Ruchi Tyagi, Cadence _DRA_ * Not Attending * Dave Clemans, Synopsys _DRA_ * John Shields, Mentor _DR_ * Adam Sherer, Cadence _DR_ * Gael Paul, Accellera _DR_ * Michael Smith, Synopsys _DRA_ * Jeff Fox, Altera _DR_ * Luis Humberto, Jasper _DRA_ * Sourabh Tandon, Synopsys * Jonathan Goldberg, IEEE Professional Services * Joe Hupcey, Jasper _DR_ * Sridhar Gangadharan, Atrenta _DR_ * Nitin Khurana, Cadence _DR_ * Krista Gluchoski, IEEE Professional Services * Dmitry Melnick, Aldec _DRA_ * Stan Krolikoski, Cadence (DASC Chair) * Parminder Gill, Synopsys _DRA_ ---+++ Agenda 1 Schedule 1 Reviewer comments 1 Other Business ---+++ Minutes ---++++ Schedule <table cellspacing="0" cellpadding="0" border="0"> <colgroup span="1"><col width="201" span="1"></col><col width="73" span="1"></col><col width="75" span="2"></col></colgroup> <tbody> <tr height="30"> <td width="201" height="20"> Item </td> <td width="73"> Duration </td> <td width="75"> Start </td> <td width="75"> End </td> </tr> <tr height="30"> <td height="30"> Finish Draft 5 preparation </td> <td align="right"> 65 </td> <td align="right"> 3/23/2014 </td> <td align="right"> 5/27/2014 </td> </tr> <tr height="30"> <td height="30"> Draft 5 PDF creation </td> <td align="right"> 13 </td> <td align="right"> 5/27/2014 </td> <td align="right"> 6/9/2014 </td> </tr> <tr height="30"> <td height="30"> Draft 5 reivew </td> <td align="right"> 14 </td> <td align="right"> 6/9/2014 </td> <td align="right"> 6/23/2014 </td> </tr> <tr height="30"> <td height="30"> Draft 6 PDF creation </td> <td align="right"> 4 </td> <td align="right"> 6/23/2014 </td> <td align="right"> 6/27/2014 </td> </tr> <tr height="30"> <td height="30"> Ballot </td> <td align="right"> 45 </td> <td align="right"> 6/27/2014 </td> <td align="right"> 8/11/2014 </td> </tr> <tr height="30"> <td height="30"> Review comments/rework </td> <td align="right"> 30 </td> <td align="right"> 8/11/2014 </td> <td align="right"> 9/10/2014 </td> </tr> <tr height="30"> <td height="30"> Recirculation ballot </td> <td align="right"> 30 </td> <td align="right"> 9/10/2014 </td> <td align="right"> 10/10/2014 </td> </tr> <tr height="30"> <td height="30"> Submit for revcom </td> <td align="right"> 50 </td> <td align="right"> 10/10/2014 </td> <td align="right"> 11/29/2014 </td> </tr> <tr height="30"> <td height="30"> </td> <td> </td> <td> </td> <td> </td> </tr> <tr height="30"> <td height="30"> Revcom opportunity </td> <td> </td> <td align="right"> 12/9/2014 </td> <td> </td> </tr> <tr height="30"> <td align="right" height="30"> Slack </td> <td align="right"> 1 </td> <td> 0 </td> <td> </td> </tr> </tbody> </table> ---++ Technical Editor comments: Updates sent today on Clause 1 to incorporate feedback from Adam and John. Also incorporated non-controversal feedback into other clauses - not circulated yet. About a dozen comments from John and one from Ray still open. ---++ Steve comments: 8.7 - Wrong keywords. Steve will post comments this afternoon including above, typographical recommendations, use of V1/V2 and version1/version 2. ---++ Mentor comments: 98 of them. All but 13 addressed by Joe, the ones marked in red (update not circulatecd yet). Highlighted by John: 1.2 – we make a statement about what this standard specifies that is false. Ruchi/Steve, This is the first draft with your new rewrite. It still has the basic problem I have raised in the past about self-signed certificates and validation of identity. I hope we can fix it. Clause 6.2.4 is flawed. It suggests that self-signed certificates are valuable for trusting identity. That is false. It notes web of trust and suggest self-signed certs are used with web of trust. It fails to clarify that web of trust based on signing depends on other signatures besides the self signature. Without those other signatures, there is no trust established from the provenance of the cert. At that point, it is no different than an unsigned cert or a pragma based public key. 6.4 intro paragraph overstates things. We only require pragma exchange format for [V1] and we have added certificate exchange format for [V2]. 6.4.2.3 discusses validity and overreaches, IMHO. There is discussion in Annex C on this topic. Dave, The tool block is defined to contain the key block in clause 7. This is version 2 only and different from V1 structure. That is fine in and of itself. I think we might need to take into account things that are triggered at the presence of the key block in V1. We recognize the digital envelope use case when a key block is detected. We clarify SV semantics of naming keys and handling pragma values based on the key block in 5.3.3. We should make sure that the tool block embedded key block has the same properties or clarify the differences. I don’t have a prescription for what to change. In 7.4.5, I like the addition of short-circuit evaluation. I have to point out that it does not apply to the example in 7.4.6 across separate rights pragmas for the same right ; each is evaluated. This is emphasized in 7.4.7. Should we point it out? It can contribute to unintended, multiple license checkouts. 7.5 Moving rights from one IP block to another IP block I am wondering what triggers a new session key for compliance to this anti-tamper rule? A session key could be construed to be once for each execution of an encryption tool, once for each encryption envelope, once for each set of common block and tool-specific rights blocks in the encryption input stream, etc. It was a non-issue for V1. Frankly, I am confused and would like to talk about it next meeting. 8.5.5 license public key should shares namespace with all other public keys in encryption envelope. I think we should do that by reference and I noted where this is an issue in a couple of spots. ---++ Xilinx comments: 14 of them ---++ Cadence comments: From Adam: Page 6 (of the pdf) - Please add Ruchi to the Participants list Page 17 Clause 5.4.1.1 – Will the 1735 committee manage the public keys? If we are not taking on the work, then I don’t believe we can set the requirement here so strongly. At best I would say “… Public key management strategies can be defined …”. Page 86 Clause B.2.1 — Conformance “recommendations”. “Requirements" suggests a body that will check compliance. More from Ruchi ---++ Synopsys comments: 3 of them - all simple ---++++ Other Business ---++++ Next Meeting WG meeting 6/23. -- Main.DaveGraubart - 2014-06-20
E
dit
|
A
ttach
|
P
rint version
|
H
istory
: r1
|
B
acklinks
|
V
iew topic
|
Ra
w
edit
|
M
ore topic actions
Topic revision: r1 - 2014-06-20 - 19:59:33 -
DaveGraubart
P1735
Log In
or
Register
P1735 Web
Create New Topic
Index
Search
Changes
Notifications
Statistics
Preferences
Webs
Main
P1076
Ballots
LCS2016_080
P10761
P1647
P16661
P1685
P1734
P1735
P1778
P1800
P1801
Sandbox
TWiki
VIP
VerilogAMS
Copyright © 2008-2026 by the contributing authors. All material on this collaboration platform is the property of the contributing authors.
Ideas, requests, problems regarding TWiki?
Send feedback